US20110088028A1 - Mobile Point-Of-Presence for On Demand Network Client Services and Security - Google Patents

Mobile Point-Of-Presence for On Demand Network Client Services and Security Download PDF

Info

Publication number
US20110088028A1
US20110088028A1 US12/576,470 US57647009A US2011088028A1 US 20110088028 A1 US20110088028 A1 US 20110088028A1 US 57647009 A US57647009 A US 57647009A US 2011088028 A1 US2011088028 A1 US 2011088028A1
Authority
US
United States
Prior art keywords
mobile device
network
point
communications network
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/576,470
Other versions
US8442510B2 (en
Inventor
Mostafa Tofighbakhsh
David R. Wolter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
AT&T Intellectual Property I LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LP filed Critical AT&T Intellectual Property I LP
Priority to US12/576,470 priority Critical patent/US8442510B2/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P. reassignment AT&T INTELLECTUAL PROPERTY I, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TOFIGHBAKHSH, MOSTAFA, WOLTER, DAVID R.
Publication of US20110088028A1 publication Critical patent/US20110088028A1/en
Priority to US13/892,898 priority patent/US9432386B2/en
Application granted granted Critical
Publication of US8442510B2 publication Critical patent/US8442510B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Definitions

  • the present invention relates to the field of communications networks.
  • the present invention relates to methods, systems, and devices that enable device-level and network-level network operator control.
  • Erroneous mobile device behavior can compromise user data, corrupt billing records, or even congest network resources denying or degrading data and voice service to users. Examples of such behavior include tampering with device firmware to allow the user to place an unbilled phone call or mobile device infection by a virus which causes it to take part in a distributed denial of service attack on a server. As well, the wireless communications networks frequently used by mobile devices add new challenges in network performance not sufficiently accounted for by protocols designed with wired networks in mind.
  • the iPhoneTM is only available in the United States for use on the AT&TTM mobile service network.
  • a user purchases a service plan from a mobile service provider and is presented with a choice of mobile devices configured by the mobile service provider for that service plan.
  • a mobile service provider configures a mobile device before allowing it to operate on its mobile service network, it has, for example, the opportunity to install device identification, performance monitoring, and troubleshooting software directly into the mobile device.
  • the standard operating system software such as Symbian
  • Symbian generally found on unlocked devices displaces the proprietary software heretofore found on non-unlocked mobile devices, the ability of a virus to create a mass infection of mobile devices becomes that much greater.
  • the present invention discloses systems, methods, and devices implementing a point-of-presence system on a mobile service network.
  • a point-of-presence system comprises a mobile device communications network, a mobile device, a point-of-presence logic installed on a mobile device, and an application server in communication with the point-of-presence logic via the communications network. Communications between the point-of-presence logic and the application server include network data, configuration, and/or installation of connection and device management applications.
  • This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service and quality of experience to mobile users.
  • communications between the point-of-presence logic and the application server implement the initial configuration of an off-the-shelf mobile device.
  • This enables the mobile device to connect to the mobile service network, the application server to remotely diagnose device function including problems with its connection to the network, the application server to perform customer service transactions for the user of the mobile device, dynamic optimization of the network connection including optimization based on user behavior and or applications in use on the mobile device, and implementation of security protocols when an attack on the device or the network is detected or anticipated.
  • the present invention is a mobile device.
  • the mobile device includes a microprocessor, a memory in communication with the microprocessor, a point-of-presence logic stored in the memory, or on a smart card coupled to the mobile device, and a transceiver in communication with the point-of-presence logic via the microprocessor.
  • the point-of-presence logic constitutes a mechanism for the service provider to best optimize resources on a communications network, even at the device level, while providing optimum network service.
  • the present invention is a point-of-presence system.
  • the point-of-presence system includes a communications network, a mobile device connected to the communications network, an applications server connected to the communications network, and a point-of-presence logic running on the mobile device.
  • the point-of-presence logic optimizes the mobile device's connection to the communications network based on a plurality of data received from the applications server.
  • the present invention is a mobile device.
  • the mobile device includes a microprocessor, a memory in communication with the microprocessor, a point-of-presence logic stored in the memory, and a transceiver in communication with the point-of-presence logic via the microprocessor.
  • the point-of-presence logic constitutes a mechanism for the service provider to best optimize resources on a communications network, even at the device level, while providing optimum network service.
  • the memory may be part of a smart card coupled to the mobile device.
  • FIG. 1 displays a schematic diagram of a distributed denial of service attack.
  • FIG. 2 displays a flow chart of a method for the configuration of a mobile device for connection to a mobile service network, according to an exemplary embodiment of the present invention.
  • FIG. 3 displays a schematic diagram of the flow of information over the network and the mobile device in a point-of-presence system during communications between the point-of-presence logic on the device and the applications server, according to an exemplary embodiment of the present invention.
  • FIG. 4 displays a schematic diagram illustrating the flow of information over software and hardware elements of the mobile device in communication with the application server, according to an exemplary embodiment of the present invention.
  • FIGS. 5A , 5 B, and 5 C display screenshots of a mobile device that is part of a point-of-presence system, according to an exemplary embodiment of the present invention.
  • the present invention discloses systems, methods, and devices implementing a point-of-presence system on a mobile service network.
  • a point-of-presence system comprises a mobile device communications network; a mobile device; a point-of-presence logic installed on a mobile device; and an application server in communication with the point-of-presence logic via the communications network.
  • Communications between the point-of-presence logic and the application server include network data, configuration, and/or installation of connection and device management applications. This communication can occur via a closed loopback protocol.
  • This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service to mobile users.
  • the point-of-presence logic may be stored on a memory on a smart card that is removably coupled to the mobile device.
  • communications between the point-of-presence logic and the application server implement the initial configuration of an off-the-shelf mobile device.
  • This enables the mobile device to connect to the mobile service network, the application server to remotely diagnose device function including problems with its connection to the network, retrieve local performance statistics collected on the device, the application server to perform customer service transactions for the user of the mobile device, dynamic optimization of the network connection including optimization based on applications, real-time and historical user behavior in use on the mobile device, and implementation of security protocols when an attack on the device or the network is detected or anticipated.
  • a “mobile device” refers to any information-processing portable device able to maintain a connection to a network through which it exchanges information with other entities, or a fixed-location device using the wireless network for its communication.
  • Examples of acceptable mobile devices by this definition include smartphones, personal data assistants (PDAs), laptop computers, netbooks, cellular telephones, etc., as well as fixed wireless terminals such as vending machines, point-of-sale terminals, etc.
  • configuration of such a mobile device for a communications network refers to installation of software on the mobile device, or enablement of pre-existing software on a smart card coupled to the mobile device, setting of mobile device parameters, and/or registration of the mobile device with the operator of the communications network so the mobile device is able to operate on the communications network.
  • pre-configuration of such a mobile device for a communications network refers to configuration of the mobile device for the communications network at the time of its manufacture or before the purchase of the device by its user specifically for that communications network. In some cases, pre-configuring the device in this manner includes installing identification, security, and connection management software.
  • such a mobile device is said to be “off-the-shelf” with respect to a given communications network if it has not undergone pre-configuration for that communications network.
  • attack such a mobile device refers to a deliberate communication by a third party (neither the user of the device nor the operator of the communications network) to the mobile device which causes the mobile device to malfunction or causes other entities to malfunction.
  • examples of such attacks include installing viruses, worms, or Trojan Horses on the mobile device, or causing the device to participate in a distributed denial of service attack.
  • FIG. 1 displays a schematic diagram of a distributed denial of service attack.
  • a point-of-presence system curtails the effectiveness of such an attack.
  • an attacking computer 100 through, for example, installation of malicious software, causes a plurality of handler computers 102 to infect a plurality of compromised computers 104 so that at the command of attacking computer 100 , compromised computers 104 flood a target server 106 with requests for service.
  • compromised computers 104 flood a target server 106 with requests for service.
  • Such attacks so congest the network of which target server 106 is a part that they effectively deny legitimate requests from other entities for service by target server 106 or simply so overwhelm it that its software crashes.
  • FIG. 2 displays a flow chart of a method for the configuration of a mobile device for connection to a communications network in one exemplary embodiment of the present invention.
  • this configuration happens “over the air”, i.e., via one or more wireless connections between the mobile device and the communications network.
  • the method begins when the user requests a particular type of service on the communications network through a web portal, S 211 .
  • a request includes selection by the user of a specific Service Level Agreement (SLA) and identification and billing details for the user.
  • SLA Service Level Agreement
  • the method can additionally includes a determination of an optimum Quality of Experience (QoE) achievable by the network for the user under a specific set of conditions.
  • QoE Quality of Experience
  • the operator of the communications network receives the request or the determination of QoE, S 212 and sends to the mobile device a plurality of network element software and configuration parameters, S 222 .
  • This plurality of network element software includes applications for transcoding, compression, codecs, the presentation stack, and security.
  • the mobile device receives this plurality of network element software and configuration parameters, installs the software, and optimizes mobile device hardware and software according to the configuration parameters, S 221 . Access to the services of the network by the mobile device is restricted or limited until the installation step is complete. Thus, the mobile device may have limited connectivity for the purpose of installing the software via the network or other means, before it is able to avail of the services offered by the network.
  • this plurality of network element software implements a plurality of standard, communications-network managed objects through which the network operator is able to perform remote diagnostics of the mobile device condition, including its connection to the communications network, and customer service functions.
  • the mobile device then makes a request for a connection to the communications network, S 231 .
  • the operator of the communications network receives the request S 232 and registers the mobile device on the communications network S 242 , establishing the mobile device on the communications network, S 241 .
  • a distinct computing entity such as a desktop computer in communication with the mobile device, accesses the web portal to initiate the configuration of the mobile device via the communication between the mobile device and the distinct computing entity.
  • the user of the mobile device configures the mobile device for the communications network by plugging a USB dongle storing a program that, when run by the user of the mobile device, installs the plurality of network element software and tunes mobile device hardware and software according to the configuration parameters.
  • the user of the mobile device configures the mobile device for the communications network by installing into an appropriate slot of the mobile device a smart SIM card, such as a Universal Integrated Circuit Card (UICC), which implements a program that installs the plurality of network element software and tunes mobile device hardware and software according to the configuration parameters.
  • a smart SIM card such as a Universal Integrated Circuit Card (UICC)
  • UICC Universal Integrated Circuit Card
  • the plurality of network element software and configuration parameters are either stored on the UICC itself or the UICC directs the mobile device to make a connection to a remote server from which the mobile device downloads the required network element software and configuration parameters.
  • FIG. 3 displays a schematic diagram of the flow of information over a communications network in a point-of-presence system during communications between a mobile device 314 and an applications server 338 in one exemplary embodiment of the present invention wherein applications server 338 makes a request to mobile device 314 .
  • the communications network includes mobile device 314 , a network access point 318 , a network access point management controller 322 , a core network infrastructure 326 through which the mobile device is able to be connected to a public switched telephone network (PSTN) 330 and a wide area network 334 , and an applications server 338 .
  • PSTN public switched telephone network
  • wide area network 334 is the INTERNET or any private IP/packet-based network operated by a service provider.
  • a request is generated in application server 338 and transferred via wide area network 334 to core network infrastructure 326 .
  • Core network infrastructure 326 switches the request to network access point 318 , to which mobile device 314 is connected, via network access point management controller 322 .
  • the communications from the application server to the mobile device constitute a request to the point-of-presence logic on the device to transfer the information contained in the public and private device level management information bases (MIBs) to the application server.
  • MIBs device level management information bases
  • the point-of-presence logic acting as an agent for the network and application server, sends the requested information to the application server so the application server is able to decide if any adjustments or limitations need to be made in the connection between the mobile device and the communications network.
  • FIG. 4 displays a schematic diagram illustrating the flow of information over software and hardware elements of a mobile device 414 in communication with an application server, according to an exemplary embodiment of the present invention.
  • mobile device 414 includes a software defined radio (SDR), or a software configurable radio.
  • SDR software defined radio
  • every layer of the full set of network protocols the mobile device uses to communicate over the communications network, including the physical layer, is able to be configured via software operating on the mobile device.
  • an antenna 442 receives a signal from the application server.
  • a codec 443 translates this signal into signal content understandable by the software running on mobile device 414 .
  • such translation includes decoding of the received signal.
  • the signal content is then passed to the SDR application programming interface (API) 444 which, depending on the signal content, passes the signal content to the relevant applications running on mobile device 414 , via operating system 440 .
  • API application programming interface
  • the signal content informs point-of-presence logic 448 that mobile device 414 has been acting in an anomalous manner.
  • the applications server comparing the usual network usage profile for the user of mobile device 414 noted a sharp increase in requests by mobile device 414 to a server which has been reported as a target for a distributed denial of service attack.
  • Point-of-presence logic 448 as it monitors the network traffic of mobile device 414 , then blocks any traffic from a plurality of mobile device applications 450 headed to the IP address of the targeted server.
  • the point-of-presence logic periodically transmits a plurality of user network usage statistics to a user profile maintained on the applications server. In that embodiment, maintenance of such a user profile aids in detecting anomalous behavior on the part of mobile device 414 .
  • a plurality of new network applications are downloaded from the applications server and stored on a device memory 446 .
  • the point-of-presence logic instructs the SDR, via the SDR API, to switch the implemented communications protocol from a GSM cellular protocol to a WIFI protocol when the point-of-presence logic detects a strong enough WIFI connection to ensure acceptable quality of service for the in-use network applications.
  • FIGS. 5A , 5 B, and 5 C display screenshots of a mobile device that forms part of a point-of-presence system, according to an exemplary embodiment of the present invention.
  • FIG. 5A displays a screenshot of a web browser 590 displaying a web portal page 591 through which a user of the mobile device is able to sign up for service on a communications network in one exemplary embodiment of the present invention.
  • the user On web portal page 591 , the user enters a plurality of identification information 592 .
  • the identification information includes the user's name, address, etc.
  • the user clicks on a download link 593 which initiates the download from the applications server to the mobile device of the necessary network element software and configuration parameters needed by the device to connect to the communications network.
  • the service sign-up page requests payment information prior to allowing the download.
  • the download link does not become active until the payment has been processed.
  • FIG. 5B displays a screenshot of web browser 590 displaying a network features installation page 594 via which a user of the mobile device is able to install a plurality of network management and network application features 595 to the mobile device.
  • network management and network application features 595 include a “Sport Scores Widget”, an application displaying scores of notable sporting events on the user's desktop and a “Customer Service Widget”, an application acting as a portal to a customer service representative for the communications network.
  • Embodiments of the network feature installation pages including a wide array of applications. Those having skill in the art will recognize other applications appropriate for download.
  • FIG. 5C displays a screenshot of a network priority and health application 596 .
  • Network priority and health application 596 displays a list of applications 597 using the connection between the mobile device and the communications network, by rank. Higher ranked applications get higher priority in the competition for the limited bandwidth maintained by the connection between the mobile device and the connections network. In this embodiment, clicking on any application displays the bandwidth used by that application as a function of time. Dragging any application allows the user to give the application a new ranking in list of applications 597 .
  • a signal strength icon 598 displays the strength of signal for the currently active wireless connection to the communications network.
  • the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.

Abstract

Devices, systems and methods are disclosed which relate to implementing a point-of-presence system on a mobile service network. Such a point-of-presence system includes a mobile device communications network; a mobile device; a point-of-presence logic installed on a mobile device; and an application server in communication with the point-of-presence logic via the communications network. Communications between the point-of-presence logic and the network and application server include network data, configuration, and/or installation of connection and device management applications. This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service to mobile users—even for mobile devices that have not been pre-configured for the mobile service network.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to the field of communications networks. In particular, the present invention relates to methods, systems, and devices that enable device-level and network-level network operator control.
  • 2. Background of the Invention
  • Erroneous mobile device behavior can compromise user data, corrupt billing records, or even congest network resources denying or degrading data and voice service to users. Examples of such behavior include tampering with device firmware to allow the user to place an unbilled phone call or mobile device infection by a virus which causes it to take part in a distributed denial of service attack on a server. As well, the wireless communications networks frequently used by mobile devices add new challenges in network performance not sufficiently accounted for by protocols designed with wired networks in mind.
  • Traditionally, there has been a link between mobile devices and mobile service providers. For example, the iPhone™ is only available in the United States for use on the AT&T™ mobile service network. Typically, a user purchases a service plan from a mobile service provider and is presented with a choice of mobile devices configured by the mobile service provider for that service plan.
  • Increasingly, however, users desire the freedom to choose a mobile device independently from their choice of mobile service provider. As mobile devices become more complex, it makes more sense for users to keep their mobile devices even if they desire to switch their mobile service providers. Such a consideration was less important when the difference in handsets was mainly cosmetic. Currently, so much personal data is present on these devices that switching devices can require significant effort. In addition, when mobile service providers need to specifically configure mobile devices for their network, mobile service providers are forced to have to deal with thousands of mobile device and operating system vendors. This necessity means that introducing new services and network features to their users is that much more tortuous. Such considerations have given rise to the proliferation for sale of “unlocked” devices, i.e., devices not tied by some means to work only with a particular mobile service provider.
  • While they provide opportunities to users and mobile service providers, the proliferation of such devices can pose increased threats to communications networks maintained by service providers. When a mobile service provider configures a mobile device before allowing it to operate on its mobile service network, it has, for example, the opportunity to install device identification, performance monitoring, and troubleshooting software directly into the mobile device. Furthermore, as the standard operating system software, such as Symbian, generally found on unlocked devices displaces the proprietary software heretofore found on non-unlocked mobile devices, the ability of a virus to create a mass infection of mobile devices becomes that much greater.
  • Thus there is a need for systems, methods, and devices that allow mobile service providers to monitor and control mobile devices even when they have not been pre-configured to operate on the mobile service network.
  • SUMMARY OF THE INVENTION
  • The present invention discloses systems, methods, and devices implementing a point-of-presence system on a mobile service network. Such a point-of-presence system comprises a mobile device communications network, a mobile device, a point-of-presence logic installed on a mobile device, and an application server in communication with the point-of-presence logic via the communications network. Communications between the point-of-presence logic and the application server include network data, configuration, and/or installation of connection and device management applications. This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service and quality of experience to mobile users.
  • In an exemplary embodiment of a point-of-presence system, communications between the point-of-presence logic and the application server implement the initial configuration of an off-the-shelf mobile device. This enables the mobile device to connect to the mobile service network, the application server to remotely diagnose device function including problems with its connection to the network, the application server to perform customer service transactions for the user of the mobile device, dynamic optimization of the network connection including optimization based on user behavior and or applications in use on the mobile device, and implementation of security protocols when an attack on the device or the network is detected or anticipated.
  • In one exemplary embodiment, the present invention is a mobile device. The mobile device includes a microprocessor, a memory in communication with the microprocessor, a point-of-presence logic stored in the memory, or on a smart card coupled to the mobile device, and a transceiver in communication with the point-of-presence logic via the microprocessor. The point-of-presence logic constitutes a mechanism for the service provider to best optimize resources on a communications network, even at the device level, while providing optimum network service.
  • In another exemplary embodiment, the present invention is a point-of-presence system. The point-of-presence system includes a communications network, a mobile device connected to the communications network, an applications server connected to the communications network, and a point-of-presence logic running on the mobile device. The point-of-presence logic optimizes the mobile device's connection to the communications network based on a plurality of data received from the applications server.
  • In yet another exemplary embodiment, the present invention is a mobile device. The mobile device includes a microprocessor, a memory in communication with the microprocessor, a point-of-presence logic stored in the memory, and a transceiver in communication with the point-of-presence logic via the microprocessor. The point-of-presence logic constitutes a mechanism for the service provider to best optimize resources on a communications network, even at the device level, while providing optimum network service. The memory may be part of a smart card coupled to the mobile device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 displays a schematic diagram of a distributed denial of service attack.
  • FIG. 2 displays a flow chart of a method for the configuration of a mobile device for connection to a mobile service network, according to an exemplary embodiment of the present invention.
  • FIG. 3 displays a schematic diagram of the flow of information over the network and the mobile device in a point-of-presence system during communications between the point-of-presence logic on the device and the applications server, according to an exemplary embodiment of the present invention.
  • FIG. 4 displays a schematic diagram illustrating the flow of information over software and hardware elements of the mobile device in communication with the application server, according to an exemplary embodiment of the present invention.
  • FIGS. 5A, 5B, and 5C display screenshots of a mobile device that is part of a point-of-presence system, according to an exemplary embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention discloses systems, methods, and devices implementing a point-of-presence system on a mobile service network. Such a point-of-presence system comprises a mobile device communications network; a mobile device; a point-of-presence logic installed on a mobile device; and an application server in communication with the point-of-presence logic via the communications network. Communications between the point-of-presence logic and the application server include network data, configuration, and/or installation of connection and device management applications. This communication can occur via a closed loopback protocol. This point-of-presence system constitutes a mechanism for the service provider to best optimize network resources, even at the device level, while providing optimum network service to mobile users. The point-of-presence logic may be stored on a memory on a smart card that is removably coupled to the mobile device.
  • In an exemplary embodiment of a point-of-presence system, communications between the point-of-presence logic and the application server implement the initial configuration of an off-the-shelf mobile device. This enables the mobile device to connect to the mobile service network, the application server to remotely diagnose device function including problems with its connection to the network, retrieve local performance statistics collected on the device, the application server to perform customer service transactions for the user of the mobile device, dynamic optimization of the network connection including optimization based on applications, real-time and historical user behavior in use on the mobile device, and implementation of security protocols when an attack on the device or the network is detected or anticipated.
  • As used herein and throughout this disclosure, a “mobile device” refers to any information-processing portable device able to maintain a connection to a network through which it exchanges information with other entities, or a fixed-location device using the wireless network for its communication. Examples of acceptable mobile devices by this definition include smartphones, personal data assistants (PDAs), laptop computers, netbooks, cellular telephones, etc., as well as fixed wireless terminals such as vending machines, point-of-sale terminals, etc.
  • As used herein and throughout this disclosure, “configuration” of such a mobile device for a communications network refers to installation of software on the mobile device, or enablement of pre-existing software on a smart card coupled to the mobile device, setting of mobile device parameters, and/or registration of the mobile device with the operator of the communications network so the mobile device is able to operate on the communications network. As used herein and throughout this disclosure “pre-configuration” of such a mobile device for a communications network refers to configuration of the mobile device for the communications network at the time of its manufacture or before the purchase of the device by its user specifically for that communications network. In some cases, pre-configuring the device in this manner includes installing identification, security, and connection management software. As used herein and throughout this disclosure, such a mobile device is said to be “off-the-shelf” with respect to a given communications network if it has not undergone pre-configuration for that communications network. As used herein and throughout this disclosure, to “attack” such a mobile device refers to a deliberate communication by a third party (neither the user of the device nor the operator of the communications network) to the mobile device which causes the mobile device to malfunction or causes other entities to malfunction. By this definition, examples of such attacks include installing viruses, worms, or Trojan Horses on the mobile device, or causing the device to participate in a distributed denial of service attack.
  • For the following description, it can be assumed that most correspondingly labeled structures across the figures (e.g., 132 and 232, etc.) possess the same characteristics and are subject to the same structure and function. If there is a difference between correspondingly labeled elements that is not pointed out, and this difference results in a non-corresponding structure or function of an element for a particular embodiment, then that conflicting description given for that particular embodiment shall govern.
  • For context, FIG. 1 displays a schematic diagram of a distributed denial of service attack. In an exemplary embodiment of the present invention, a point-of-presence system curtails the effectiveness of such an attack. In such an attack, an attacking computer 100, through, for example, installation of malicious software, causes a plurality of handler computers 102 to infect a plurality of compromised computers 104 so that at the command of attacking computer 100, compromised computers 104 flood a target server 106 with requests for service. Such attacks so congest the network of which target server 106 is a part that they effectively deny legitimate requests from other entities for service by target server 106 or simply so overwhelm it that its software crashes.
  • FIG. 2 displays a flow chart of a method for the configuration of a mobile device for connection to a communications network in one exemplary embodiment of the present invention. In this embodiment, this configuration happens “over the air”, i.e., via one or more wireless connections between the mobile device and the communications network. In this embodiment, the method begins when the user requests a particular type of service on the communications network through a web portal, S211. Such a request includes selection by the user of a specific Service Level Agreement (SLA) and identification and billing details for the user. The method can additionally includes a determination of an optimum Quality of Experience (QoE) achievable by the network for the user under a specific set of conditions. The operator of the communications network receives the request or the determination of QoE, S212 and sends to the mobile device a plurality of network element software and configuration parameters, S222. This plurality of network element software includes applications for transcoding, compression, codecs, the presentation stack, and security. The mobile device receives this plurality of network element software and configuration parameters, installs the software, and optimizes mobile device hardware and software according to the configuration parameters, S221. Access to the services of the network by the mobile device is restricted or limited until the installation step is complete. Thus, the mobile device may have limited connectivity for the purpose of installing the software via the network or other means, before it is able to avail of the services offered by the network. In this embodiment, this plurality of network element software implements a plurality of standard, communications-network managed objects through which the network operator is able to perform remote diagnostics of the mobile device condition, including its connection to the communications network, and customer service functions. The mobile device then makes a request for a connection to the communications network, S231. The operator of the communications network receives the request S232 and registers the mobile device on the communications network S242, establishing the mobile device on the communications network, S241.
  • In an alternative embodiment of the present invention, instead of the mobile device itself accessing the web portal to begin its configuration for the communications network, a distinct computing entity, such as a desktop computer in communication with the mobile device, accesses the web portal to initiate the configuration of the mobile device via the communication between the mobile device and the distinct computing entity. In another alternative embodiment, instead of the configuration of the mobile device for the communications network occurring over-the-air, the user of the mobile device configures the mobile device for the communications network by plugging a USB dongle storing a program that, when run by the user of the mobile device, installs the plurality of network element software and tunes mobile device hardware and software according to the configuration parameters. In yet another alternative embodiment, the user of the mobile device configures the mobile device for the communications network by installing into an appropriate slot of the mobile device a smart SIM card, such as a Universal Integrated Circuit Card (UICC), which implements a program that installs the plurality of network element software and tunes mobile device hardware and software according to the configuration parameters. In this embodiment, the plurality of network element software and configuration parameters are either stored on the UICC itself or the UICC directs the mobile device to make a connection to a remote server from which the mobile device downloads the required network element software and configuration parameters.
  • FIG. 3 displays a schematic diagram of the flow of information over a communications network in a point-of-presence system during communications between a mobile device 314 and an applications server 338 in one exemplary embodiment of the present invention wherein applications server 338 makes a request to mobile device 314. The communications network includes mobile device 314, a network access point 318, a network access point management controller 322, a core network infrastructure 326 through which the mobile device is able to be connected to a public switched telephone network (PSTN) 330 and a wide area network 334, and an applications server 338. In this embodiment, wide area network 334 is the INTERNET or any private IP/packet-based network operated by a service provider. According to this embodiment, a request is generated in application server 338 and transferred via wide area network 334 to core network infrastructure 326. Core network infrastructure 326 switches the request to network access point 318, to which mobile device 314 is connected, via network access point management controller 322.
  • In a further embodiment of the present invention, the communications from the application server to the mobile device constitute a request to the point-of-presence logic on the device to transfer the information contained in the public and private device level management information bases (MIBs) to the application server. As a result of this request, the point-of-presence logic, acting as an agent for the network and application server, sends the requested information to the application server so the application server is able to decide if any adjustments or limitations need to be made in the connection between the mobile device and the communications network.
  • FIG. 4 displays a schematic diagram illustrating the flow of information over software and hardware elements of a mobile device 414 in communication with an application server, according to an exemplary embodiment of the present invention. In this embodiment, mobile device 414 includes a software defined radio (SDR), or a software configurable radio. For such a device, every layer of the full set of network protocols the mobile device uses to communicate over the communications network, including the physical layer, is able to be configured via software operating on the mobile device.
  • In this embodiment, an antenna 442 receives a signal from the application server. A codec 443 translates this signal into signal content understandable by the software running on mobile device 414. In this embodiment, such translation includes decoding of the received signal. The signal content is then passed to the SDR application programming interface (API) 444 which, depending on the signal content, passes the signal content to the relevant applications running on mobile device 414, via operating system 440.
  • In this embodiment, the signal content informs point-of-presence logic 448 that mobile device 414 has been acting in an anomalous manner. In this embodiment, the applications server, comparing the usual network usage profile for the user of mobile device 414 noted a sharp increase in requests by mobile device 414 to a server which has been reported as a target for a distributed denial of service attack. Point-of-presence logic 448, as it monitors the network traffic of mobile device 414, then blocks any traffic from a plurality of mobile device applications 450 headed to the IP address of the targeted server.
  • In an alternative embodiment, the point-of-presence logic periodically transmits a plurality of user network usage statistics to a user profile maintained on the applications server. In that embodiment, maintenance of such a user profile aids in detecting anomalous behavior on the part of mobile device 414. In another alternative embodiment, a plurality of new network applications are downloaded from the applications server and stored on a device memory 446. In another alternative embodiment, the point-of-presence logic instructs the SDR, via the SDR API, to switch the implemented communications protocol from a GSM cellular protocol to a WIFI protocol when the point-of-presence logic detects a strong enough WIFI connection to ensure acceptable quality of service for the in-use network applications. Because every layer of communication protocols between the mobile device and the communications network is able to be configured by the point-of-presence logic, cross-layer optimization schemes are able to be implemented by the point-of-presence logic as well. Although the present embodiment is described with respect to an SDR, the present invention is not limited to SDR devices, and non-SDR devices can still perform the actions disclosed herein.
  • FIGS. 5A, 5B, and 5C display screenshots of a mobile device that forms part of a point-of-presence system, according to an exemplary embodiment of the present invention.
  • FIG. 5A displays a screenshot of a web browser 590 displaying a web portal page 591 through which a user of the mobile device is able to sign up for service on a communications network in one exemplary embodiment of the present invention. On web portal page 591, the user enters a plurality of identification information 592. The identification information includes the user's name, address, etc. The user then clicks on a download link 593 which initiates the download from the applications server to the mobile device of the necessary network element software and configuration parameters needed by the device to connect to the communications network.
  • In some embodiments the service sign-up page requests payment information prior to allowing the download. In further embodiments, the download link does not become active until the payment has been processed.
  • FIG. 5B displays a screenshot of web browser 590 displaying a network features installation page 594 via which a user of the mobile device is able to install a plurality of network management and network application features 595 to the mobile device. In this embodiment, such features act as “drag and drop” widgets so that the user is able to select the icons corresponding to the features the user desires, drag them onto the desktop of the mobile device, and then the desired features are automatically downloaded from the applications server and installed on the mobile device. In this embodiment, network management and network application features 595 include a “Sport Scores Widget”, an application displaying scores of notable sporting events on the user's desktop and a “Customer Service Widget”, an application acting as a portal to a customer service representative for the communications network.
  • Embodiments of the network feature installation pages including a wide array of applications. Those having skill in the art will recognize other applications appropriate for download.
  • FIG. 5C displays a screenshot of a network priority and health application 596. Network priority and health application 596 displays a list of applications 597 using the connection between the mobile device and the communications network, by rank. Higher ranked applications get higher priority in the competition for the limited bandwidth maintained by the connection between the mobile device and the connections network. In this embodiment, clicking on any application displays the bandwidth used by that application as a function of time. Dragging any application allows the user to give the application a new ranking in list of applications 597. At the bottom of network priority and health application 596, a signal strength icon 598 displays the strength of signal for the currently active wireless connection to the communications network.
  • The foregoing disclosure of the exemplary embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
  • Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.

Claims (20)

1. A method for configuring a mobile device over-the-air for connection to a communications network comprising:
receiving a request for service through a wireless connection by the mobile device;
sending to the mobile device a plurality of network element software and a plurality of configuration parameters;
receiving a connection request from the mobile device after installation of the network element software on the mobile device; and
optimizing a plurality of device hardware and software according to the configuration parameters;
wherein the request is received on an application server via a closed loopback protocol between the mobile device and the application server on the communications network.
2. The method of claim 1, wherein the request for service includes selection by the user of a specific Service Level Agreement (SLA) and identification and billing details for the user, or a determination of an optimum Quality of Experience (QoE) achievable by the network for the user under a specific set of conditions.
3. The method of claim 1 wherein the mobile device includes a software defined radio or a software configurable radio.
4. The method of claim 1 wherein the network element software implements a point-of-presence logic on the device implementing quality of service standards for a plurality of applications running on the device.
5. The method of claim 1, further comprising remotely diagnosing the mobile device condition.
6. The method of claim 1, further comprising limiting access to the communications network until the network element software is installed on the mobile device.
7. A point-of-presence system comprising:
a communications network;
a mobile device connected to the communications network;
an applications server connected to the communications network; and
a point-of-presence logic running on the mobile device;
wherein the point-of-presence logic optimizes the mobile device's connection to the communications network based on a plurality of data received from the applications server.
8. The system of claim 7, wherein the plurality of data includes information regarding threats to the communications network, overall health of the communications network; typical usage of a user of the mobile device; and
current network policies in effect on the communications network.
9. The system of claim 7, wherein the mobile device includes a software defined radio.
10. The system of claim 7, wherein the mobile device downloads network applications from the applications server.
11. The system of claim 7, wherein the point-of-presence logic blocks a plurality of requests from the mobile device to a server that the application server has determined is under attack.
12. The system of claim 7, wherein the point-of-presence logic implements a security protocol when the applications server informs it that the mobile device is behaving in an anomalous manner.
13. The system of claim 7, wherein the communications network limits the connectivity of the mobile device prior to installation of the point-of-presence logic.
14. A mobile device comprising:
a microprocessor;
a memory in communication with the microprocessor;
a point-of-presence logic stored in the memory; and
a transceiver in communication with the point-of-presence logic via the microprocessor;
wherein the point-of-presence logic constitutes a mechanism for the service provider to best optimize resources on a communications network, even at the device level, while providing optimum network service.
15. The device of claim 14, wherein the memory is coupled to a smart card configured to be removably coupled to the device.
16. The device of claim 14 wherein the transceiver is a software defined radio or a software configurable radio.
17. The device of claim 14, wherein an applications server provides updates to the point-of-presence logic.
18. The device of claim 14, wherein the point-of-presence logic transmits a plurality of information stored in a plurality of management information bases to an application server via the transceiver.
19. The device of claim 14, wherein the transceiver uses one of cellular radio frequency, WiFi, and BLUETOOTH communication.
20. The device of claim 14, wherein the communications network limits connectivity of the device prior to installation of the point-of-presence logic.
US12/576,470 2009-10-09 2009-10-09 Mobile point-of-presence for on demand network client services and security Active 2031-10-03 US8442510B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/576,470 US8442510B2 (en) 2009-10-09 2009-10-09 Mobile point-of-presence for on demand network client services and security
US13/892,898 US9432386B2 (en) 2009-10-09 2013-05-13 Mobile point-of-presence for on demand network client services and security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/576,470 US8442510B2 (en) 2009-10-09 2009-10-09 Mobile point-of-presence for on demand network client services and security

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/892,898 Continuation US9432386B2 (en) 2009-10-09 2013-05-13 Mobile point-of-presence for on demand network client services and security

Publications (2)

Publication Number Publication Date
US20110088028A1 true US20110088028A1 (en) 2011-04-14
US8442510B2 US8442510B2 (en) 2013-05-14

Family

ID=43855843

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/576,470 Active 2031-10-03 US8442510B2 (en) 2009-10-09 2009-10-09 Mobile point-of-presence for on demand network client services and security
US13/892,898 Expired - Fee Related US9432386B2 (en) 2009-10-09 2013-05-13 Mobile point-of-presence for on demand network client services and security

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/892,898 Expired - Fee Related US9432386B2 (en) 2009-10-09 2013-05-13 Mobile point-of-presence for on demand network client services and security

Country Status (1)

Country Link
US (2) US8442510B2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261727A1 (en) * 2010-04-22 2011-10-27 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US20130243055A1 (en) * 2010-12-24 2013-09-19 Seung Won Choi Software-defined radio terminal device and method for distributing and installing radio application
US20130304800A1 (en) * 2012-05-14 2013-11-14 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US20150046919A1 (en) * 2013-08-08 2015-02-12 Lenovo (Beijing) Co., Ltd. Information processing method and electronic device
US9119051B2 (en) 2012-06-19 2015-08-25 At&T Mobility Ii, Llc Apparatus and methods for selecting services of mobile network operators
US9148785B2 (en) 2012-05-16 2015-09-29 At&T Intellectual Property I, Lp Apparatus and methods for provisioning devices to utilize services of mobile network operators
US9473929B2 (en) 2012-06-19 2016-10-18 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US9661023B1 (en) * 2013-07-12 2017-05-23 Symantec Corporation Systems and methods for automatic endpoint protection and policy management
US20170295451A1 (en) * 2016-04-08 2017-10-12 Neumob, Inc. Mobile application accelerator
US9924232B2 (en) * 2011-08-16 2018-03-20 Lg Electronics Inc. Display device and method for displaying broadcast content and interactive content using the same
US20180191520A1 (en) * 2015-06-25 2018-07-05 Thomson Licensing Gateway and diagnosing method thereof
US11036349B2 (en) * 2018-09-20 2021-06-15 Salesforce.Com, Inc. Stateful, contextual, and draggable embedded widget
US11429407B2 (en) * 2013-03-15 2022-08-30 The Trustees Of The University Of Pennsylvania Apparatus, method, and system to dynamically deploy wireless infrastructure
US20230131988A1 (en) * 2021-10-22 2023-04-27 AVAST Software s.r.o. Privacy preserving malicious network activity detection and mitigation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101501669B1 (en) * 2013-12-24 2015-03-12 한국인터넷진흥원 Behavior detection system for detecting abnormal behavior

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144849A (en) * 1998-02-23 2000-11-07 Adc Newnet, Inc. Method and apparatus for over-the-air service provisioning of a mobile telephone
US6785255B2 (en) * 2001-03-13 2004-08-31 Bharat Sastri Architecture and protocol for a wireless communication network to provide scalable web services to mobile access devices
US20050055689A1 (en) * 2003-09-10 2005-03-10 Abfalter Scott A. Software management for software defined radio in a distributed network
US20060223515A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. SNMP management in a software defined radio
US20060221913A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Integrated network management of a software defined radio system
US20060276173A1 (en) * 2005-06-07 2006-12-07 Lena Srey Wireless communication network security method and system
US20070042766A1 (en) * 2003-02-05 2007-02-22 Samsung Electronics Co., Ltd. System and method for delta-based over-the-air software upgrades for a wireless mobile station
US20070169093A1 (en) * 2005-08-05 2007-07-19 Logan Will K Centrally managed solution for all device management activities
US20070256071A1 (en) * 2006-04-27 2007-11-01 Jung Edward K Multi-network virus immunization
US20080132219A1 (en) * 2003-12-15 2008-06-05 International Business Machines Corporation Method and Apparatus for Preconditioning Mobile Devices for Network and Other Operations
US20090260004A1 (en) * 2008-04-10 2009-10-15 Palm, Inc. Computer program updates for mobile computing device
US20100058306A1 (en) * 2008-08-26 2010-03-04 Terry Wayne Liles System and Method for Secure Information Handling System Flash Memory Access
US20100211941A1 (en) * 2009-02-13 2010-08-19 Mobitv, Inc. System for automatic management of applications on remote devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60101271T2 (en) * 2000-05-26 2004-08-26 Roke Manor Research Ltd., Romsey ADMINISTRATIVE MODULE FOR SOFTWARE DEFINED RADIO
US20070206546A1 (en) * 2006-03-02 2007-09-06 Alberth William P Jr Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels
WO2008067335A2 (en) * 2006-11-27 2008-06-05 Smobile Systems, Inc. Wireless intrusion prevention system and method
US7992192B2 (en) * 2006-12-29 2011-08-02 Ebay Inc. Alerting as to denial of service attacks

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144849A (en) * 1998-02-23 2000-11-07 Adc Newnet, Inc. Method and apparatus for over-the-air service provisioning of a mobile telephone
US6785255B2 (en) * 2001-03-13 2004-08-31 Bharat Sastri Architecture and protocol for a wireless communication network to provide scalable web services to mobile access devices
US20070042766A1 (en) * 2003-02-05 2007-02-22 Samsung Electronics Co., Ltd. System and method for delta-based over-the-air software upgrades for a wireless mobile station
US20050055689A1 (en) * 2003-09-10 2005-03-10 Abfalter Scott A. Software management for software defined radio in a distributed network
US20080132219A1 (en) * 2003-12-15 2008-06-05 International Business Machines Corporation Method and Apparatus for Preconditioning Mobile Devices for Network and Other Operations
US20060221913A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Integrated network management of a software defined radio system
US20060223515A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. SNMP management in a software defined radio
US20060276173A1 (en) * 2005-06-07 2006-12-07 Lena Srey Wireless communication network security method and system
US20070169093A1 (en) * 2005-08-05 2007-07-19 Logan Will K Centrally managed solution for all device management activities
US20070256071A1 (en) * 2006-04-27 2007-11-01 Jung Edward K Multi-network virus immunization
US20090260004A1 (en) * 2008-04-10 2009-10-15 Palm, Inc. Computer program updates for mobile computing device
US20100058306A1 (en) * 2008-08-26 2010-03-04 Terry Wayne Liles System and Method for Secure Information Handling System Flash Memory Access
US20100211941A1 (en) * 2009-02-13 2010-08-19 Mobitv, Inc. System for automatic management of applications on remote devices

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261727A1 (en) * 2010-04-22 2011-10-27 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US20180159561A1 (en) * 2010-04-22 2018-06-07 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US9887709B2 (en) * 2010-04-22 2018-02-06 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US8861406B2 (en) * 2010-04-22 2014-10-14 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US10554229B2 (en) * 2010-04-22 2020-02-04 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US20150063174A1 (en) * 2010-04-22 2015-03-05 Samsung Electronics Co., Ltd. Transmitter apparatus of mobile device and operation method thereof
US20130243055A1 (en) * 2010-12-24 2013-09-19 Seung Won Choi Software-defined radio terminal device and method for distributing and installing radio application
US9021467B2 (en) * 2010-12-24 2015-04-28 Industry-University Cooperation Foundation Hanyang University Software-defined radio terminal device and method for distributing and installing radio application
US9924232B2 (en) * 2011-08-16 2018-03-20 Lg Electronics Inc. Display device and method for displaying broadcast content and interactive content using the same
US10530648B2 (en) 2012-05-14 2020-01-07 At&T Intellectual Property I, L.P. Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US9455869B2 (en) 2012-05-14 2016-09-27 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US10020992B2 (en) 2012-05-14 2018-07-10 At&T Intellectual Property I, L.P. Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US9686135B2 (en) 2012-05-14 2017-06-20 At&T Intellectual Property I, L.P. Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US9094774B2 (en) * 2012-05-14 2015-07-28 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US20130304800A1 (en) * 2012-05-14 2013-11-14 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US9148785B2 (en) 2012-05-16 2015-09-29 At&T Intellectual Property I, Lp Apparatus and methods for provisioning devices to utilize services of mobile network operators
US9467857B2 (en) 2012-05-16 2016-10-11 At&T Intellectual Property I, L.P. Apparatus and methods for provisioning devices to utilize services of mobile network operators
US10219145B2 (en) 2012-05-16 2019-02-26 At&T Intellectual Property I, L.P. Apparatus and methods for provisioning devices to utilize services of mobile network operators
US9906945B2 (en) 2012-05-16 2018-02-27 At&T Intellectual Property I, L.P. Apparatus and methods for provisioning devices to utilize services of mobile network operators
US10659957B2 (en) 2012-05-16 2020-05-19 At&T Intellectual Property I, L.P. Apparatus and methods for provisioning devices to utilize services of mobile network operators
US9554266B2 (en) 2012-06-19 2017-01-24 At&T Mobility Ii Llc Apparatus and methods for selecting services of mobile network operators
US9473929B2 (en) 2012-06-19 2016-10-18 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US10028131B2 (en) 2012-06-19 2018-07-17 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US10292042B2 (en) 2012-06-19 2019-05-14 At&T Mobility Ii Llc Apparatus and methods for selecting services of mobile network operators
US10516989B2 (en) 2012-06-19 2019-12-24 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US9119051B2 (en) 2012-06-19 2015-08-25 At&T Mobility Ii, Llc Apparatus and methods for selecting services of mobile network operators
US11429407B2 (en) * 2013-03-15 2022-08-30 The Trustees Of The University Of Pennsylvania Apparatus, method, and system to dynamically deploy wireless infrastructure
US9661023B1 (en) * 2013-07-12 2017-05-23 Symantec Corporation Systems and methods for automatic endpoint protection and policy management
US20150046919A1 (en) * 2013-08-08 2015-02-12 Lenovo (Beijing) Co., Ltd. Information processing method and electronic device
US20180191520A1 (en) * 2015-06-25 2018-07-05 Thomson Licensing Gateway and diagnosing method thereof
US10687188B2 (en) * 2016-04-08 2020-06-16 Cloudflare, Inc. Mobile application accelerator
US10904728B2 (en) 2016-04-08 2021-01-26 Cloudflare, Inc. Mobile application accelerator
US20170295451A1 (en) * 2016-04-08 2017-10-12 Neumob, Inc. Mobile application accelerator
US11483690B2 (en) 2016-04-08 2022-10-25 Cloudflare, Inc. Mobile application accelerator
US11036349B2 (en) * 2018-09-20 2021-06-15 Salesforce.Com, Inc. Stateful, contextual, and draggable embedded widget
US20230131988A1 (en) * 2021-10-22 2023-04-27 AVAST Software s.r.o. Privacy preserving malicious network activity detection and mitigation
US11895090B2 (en) * 2021-10-22 2024-02-06 AVAST Software s.r.o. Privacy preserving malicious network activity detection and mitigation

Also Published As

Publication number Publication date
US9432386B2 (en) 2016-08-30
US20130247188A1 (en) 2013-09-19
US8442510B2 (en) 2013-05-14

Similar Documents

Publication Publication Date Title
US8442510B2 (en) Mobile point-of-presence for on demand network client services and security
US9066230B1 (en) Trusted policy and charging enforcement function
US9420496B1 (en) Activation sequence using permission based connection to network
US9313643B1 (en) Dynamic subscriber identity module
JP6161076B2 (en) An extensible framework for wireless network connectivity
KR101625183B1 (en) Methods and apparatus for correcting error events associated with identity provisioning
JP5924708B2 (en) System and method for providing internet access to a computing device
US9386463B1 (en) Application risk analysis
US10491459B1 (en) Systems and methods for on-device adaptive self-executing diagnostics tool
US9888290B1 (en) Service denial notification in secure socket layer (SSL) processing
JP2010512690A (en) System capability detection for software defined radio
US20180091553A1 (en) Methods and devices for protecting network endpoints
US20160142890A1 (en) Method and apparatus for managing application terminal remotely in wireless communication system
US20230171586A1 (en) Automated Subscription Management for Wireless Devices Having Multiple Subscription Profiles
US8588764B1 (en) Wireless network edge guardian
EP4136868A1 (en) Embedded subscriber identity module (esim) profile adaptation based on context
US10546222B1 (en) Universal integrated circuit card (UICC) toolkit
US9930161B1 (en) System and method of caching targeted internet protocol (IP) notifications to mobile communication devices
US10282719B1 (en) Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
KR101306844B1 (en) Method and Apparatus for Searching and Intercepting Web Browsing Action of Smartphone
US20230284025A1 (en) Hyperledger Authorization into a Radio Access Network (RAN)
US11832348B2 (en) Data downloading method, data management method, and terminal
EP2391952B1 (en) Device assisted services install
US10631177B1 (en) Mobile phone chipset parameter adaptation framework
US9392574B1 (en) Notification factors and rules for proactive notification of potential service impacts

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TOFIGHBAKHSH, MOSTAFA;WOLTER, DAVID R.;REEL/FRAME:023352/0040

Effective date: 20091006

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8